Coral offers the industry best practices on Network Security Assessment. Listed below is the coverage of the assessment along with the details. Coral consulting support extends to help you optimize in design, implementation, audit and review of existing and planned infrastructure.

Network Topology & Security Architecture

Network Performance Review

Implementation Review

Vulnerability assessment

Penetration testing

Infrastructure Hardening

Network Topology & Security Architecture

Description

The network topology and architecture assessment will identification of design risk involved. Client's current network architecture, services and security setup is reviewed and recommendations are provided for mitigating security risks associated.

Network Performance Review

Description

The review performed will help in determination of utilization of the specific network. The benefit of this assessment will include disabling unnecessary services, reallocation of network infrastructure to more important network segments, and set direction for additional acquisition.

Deliverable / Benefits

Service that can be disabled;
Devices that can be reallocated;

Budgeting inputs for next IT capital expenditure

Network Implementation Review

Description

Device Level audit - Coral will carry out the device level check for respective devices against the best practices and client's policy. Our methodology includes questionnaires, interviews/meetings with key process owners, and device observations for performing the activity. Following are the devices which will be covered for the device level audit:

Vulnerability Assessment

Description

External Network Vulnerability Assessment - evaluation of network security from an external perspective (“from the outside looking in”), focusing on the defensive perimeter of the network and the devices (firewalls, routers, etc.) that provide protection against attacks launched from a remote source.

Internal Network Vulnerability Assessment - evaluation of network security from an internal perspective (“from the inside looking out”), with particular attention to those configuration and implementation weaknesses that could place the network at increased risk from the “insider” threat.
Our methodology includes a number of additional assessment services that can also be added to provide a complete picture of system security.

Deliverable / Benefits

Key deliverable include highlighting vulnerabilities waiting to be exploited. The activities results in detailed information on vulnerabilities which are most critical, which are less significant, and which are false positives. This allows the organization to more intelligently prioritize remediation.

Penetration Testing

Description

The penetration test is designed to evaluate security measures implemented in an IT environment comprising of both the network components and applications.

This test is performed using various tools for discerning network components and application and subsequently evaluating the same for vulnerabilities that may cause an impact.

Deliverable / Benefits

Penetration testing extends vulnerability assessment by demonstrating actual attack, rather than just showing you the weakness.

Provides not only detailed information on actual, exploitable security threats but also the “resulting outcome”.

Infrastructure Hardening

Deliverable / Benefits
Hardening is the process of disabling unnecessary services, ports, services, features, access consoles. Hardening applies to almost all infrastructure devices some of which are listed below: